Analysis

  • max time kernel
    102s
  • max time network
    105s
  • platform
    windows10-ltsc_2021_x64
  • resource
    win10ltsc2021-20250314-en
  • resource tags

    arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system
  • submitted
    05/04/2025, 12:07

General

  • Target

    rihuata-main/lotuserkasasa.exe

  • Size

    730KB

  • MD5

    f7c4921322db3352a828493b924bd1fe

  • SHA1

    86c4f35c83332d0832dcb63e331546d37865ff78

  • SHA256

    27c77167584ce803317eab2eb5db5963e9dfa86450237195f5723185361510dc

  • SHA512

    6456fb2d6ce773cd0899c7dd0d0e2f34577e46ebccc0b753c9acceddd46e9713277e5ec2b687a2b924e5c3d72024e3ff610661fdf44cc3a091ee13aa87aa8394

  • SSDEEP

    12288:D78oc9laEnU2j5CHdf3JYzi6GCsfN8nv47wrcxxQe:D78oUFnU2j5CHdfZYeFCsf0v4cx

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Delays execution with timeout.exe 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\rihuata-main\lotuserkasasa.exe
    "C:\Users\Admin\AppData\Local\Temp\rihuata-main\lotuserkasasa.exe"
    1⤵
    • Checks computer location settings
    • Checks processor information in registry
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1788
    • C:\Program Files\Google\Chrome\Application\chrome.exe
      "C:\Program Files\Google\Chrome\Application\chrome.exe"
      2⤵
        PID:872
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe" /c timeout /t 5 & del /f /q "C:\Users\Admin\AppData\Local\Temp\rihuata-main\lotuserkasasa.exe
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1688
        • C:\Windows\system32\timeout.exe
          timeout /t 5
          3⤵
          • Delays execution with timeout.exe
          PID:3540
    • C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe
      "C:\Program Files\Google\Chrome\Application\133.0.6943.60\elevation_service.exe"
      1⤵
        PID:4368

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads